{"id":2095,"date":"2020-08-10T09:30:17","date_gmt":"2020-08-10T13:30:17","guid":{"rendered":"https:\/\/seaglasstech.wpenginepowered.com\/?p=2095"},"modified":"2021-01-13T12:20:53","modified_gmt":"2021-01-13T17:20:53","slug":"what-is-a-network-security-assessment","status":"publish","type":"post","link":"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/","title":{"rendered":"What Is A Network Security Assessment?"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-2097 alignright\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2020\/08\/social-engineering-is-a-method-used-when-performing-network-security-assessment-300x200.jpg\" alt=\"social engineering is a method used when performing network security assessment\" width=\"300\" height=\"200\" \/>Let\u2019s be honest: the unfortunate reality is that data breaches and other types of cyberattacks are extremely prevalent. Fortunately, there is one process that is highly effective in combating these threats: a network security assessment. Oftentimes, companies do not respond to cyberattacks in a timely manner and this can create issues. <\/p>\n<p>According to Ernst &#038; Young\u2019s (EY) <a href=\"https:\/\/www.ey.com\/en_gl\/consulting\/global-information-security-survey-2018-2019\" rel=\"noopener noreferrer\" target=\"_blank\">2018-2019 Global Information Security Survey<\/a>, approximately 76% of organizations didn\u2019t invest more in security measures until after a major cyberattack occurred. Data breaches and other cyber assaults that result in the compromise of sensitive information can often take months to completely resolve, and they can cost organizations millions of dollars. Therefore, it is critical to regularly conduct a network security assessment in order to ensure that your organization is adequately protected from various types of threats.<\/p>\n<h2>What Is A Risk Assessment?<\/h2>\n<p>An IT risk assessment is essentially a type of \u201caudit.\u201d It is a process used for identifying hazards that could negatively affect your organization\u2019s capacity to operate properly. This type of evaluation should constitute the foundation of your organization\u2019s overall security strategy. <\/p>\n<p>According to Forrester Research\u2019s 2019 State of Enterprise Risk Management (ERM) report, only 36% of organizations possess a formal ERM program and 62% of businesses have experienced a major risk event during the last three years.<\/p>\n<h2>Types Of Network Security Assessments<\/h2>\n<p>The two primary types of <a href=\"\/network-security-assessment\/\">network security assessments<\/a> that organizations utilize are:<\/p>\n<h3>Vulnerability Assessment<\/h3>\n<p>This type of review process is designed to uncover weaknesses (and assess how severe these vulnerabilities are) in an organization\u2019s IT infrastructure. Testing tools such as web security and network scanners are frequently utilized for vulnerability assessments.<\/p>\n<h3>Penetration Testing<\/h3>\n<p><a href=\"\/what-is-penetration-testing\/\">Penetration testing<\/a>, also called \u201cethical hacking\u201d, this type of test is intended to imitate a real cyberattack or a social engineering assault (e.g. phishing). There are <a href=\"\/different-types-of-penetration-testing\/\">multiple methods for conducting penetration tests<\/a>, including external testing, internal testing, and blind testing. This process is not complete until the attacker covers his\/her tracks until all evidence of his\/her existence has been erased.<\/p>\n<h2>Benefits Of Network Monitoring Services<\/h2>\n<p><img decoding=\"async\" class=\"size-medium wp-image-2099 alignright\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2020\/08\/security-assessment-test-use-to-perform-audit-of-IT-infrastructure-300x200.jpg\" alt=\"security assessment test used to perform audit of IT infrastructure\" width=\"300\" height=\"200\" \/>A network security assessment is designed to ensure your networks, data, and devices remain safe and to identify potential entry points for cyberattacks. <\/p>\n<p>There are many advantages to <a href=\"\/what-is-network-monitoring\/\">network monitoring<\/a> services, although we will pay particular attention to the following five:<\/p>\n<h3>Taking Inventory Of Your Resources<\/h3>\n<p>Prior to testing your assets for weaknesses, it\u2019s imperative to take stock of all the valuable things that your organization wishes to secure. The most effective way to do this is to record your entire IT infrastructure so that you can more rapidly identify an attacker.<\/p>\n<h3>Predicting &#038; Preventing Network Downtime<\/h3>\n<p>Network monitoring services assist you with the prevention of unforeseen network outages. If downtime is preemptively dealt with, your organization can optimize service availability.<\/p>\n<h3>Testing Changes To A Network\/Device<\/h3>\n<p>If changes to a device or network are not properly implemented, the addition or reconfiguration of this network or device can negatively impact your system of networks. Network monitoring solutions give you the ability to test new connections.<\/p>\n<h3>Observing Bandwidth Usage<\/h3>\n<p><img decoding=\"async\" class=\"size-medium wp-image-2098 alignright\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2020\/08\/reports-can-be-taken-after-network-security-assessment-of-an-IT-system-has-been-done-300x200.jpg\" alt=\"reports can be taken after network security assessment of an IT system has been done\" width=\"300\" height=\"200\" \/>Many network administrators view bandwidth utilization as one of the most vital indicators of a network\u2019s performance. <\/p>\n<p>Your organization\u2019s employees can use as much bandwidth as they need while still verifying that all of your business operations are being carried out properly and efficiently.<\/p>\n<h3>Generating Network Performance Reports<\/h3>\n<p>Network monitoring services typically involve dashboards that allow you to track network activity in real-time. These solutions can also regularly create reports for your organization to analyze and used to devise a strategy for preventing future threats.<\/p>\n<p>Other benefits of network security assessments include reducing the average time to repair problems and identifying performance issues that arise after regular business hours.<\/p>\n<h2>Speak With An Experienced Managed IT Services Provider<\/h2>\n<p>Reach out to the experts at SeaGlass Technology in New York for more information about the advantages of conducting a network security assessment. We are dedicated to providing both small and mid-sized businesses with innovative and efficient <a href=\"\/it-security\/\">IT security solutions<\/a> that are customized to meet their unique needs. Our staff has extensive knowledge of top original equipment manufacturers (OEMs) and independent software vendors (ISVs), and can thus properly determine which solutions are the best fit for each client.<\/p>\n<p>SeaGlass Technology\u2019s staff are certified in both <a href=\"\/network-installation\/\">network installation and monitoring services<\/a>. We have experience in endpoint security, which means that all of your organization\u2019s devices that have Internet connection capabilities will be fully protected. We can also generate a detailed report every time we perform network monitoring services so that you can be aware of any vulnerabilities that exist in your overall IT infrastructure. Call SeaGlass Technology today at <a href=\"tel:+12128860790\">(212) 886-0790<\/a> or <a href=\"\/schedule-consultation\/\">schedule a consultation online<\/a> or to learn more about our <a href=\"\/managed-it-services-nyc\/\">managed IT services<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let\u2019s be honest: the unfortunate reality is that data breaches and other types of cyberattacks are extremely prevalent. Fortunately, there is one process that is highly effective in combating these threats: a network security assessment. Oftentimes, companies do not respond to cyberattacks in a timely manner and this can create issues. According to Ernst &#038; [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":2096,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[47],"tags":[],"content_types":[],"class_list":{"0":"post-2095","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-network-security","8":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is A Network Security Assessment? - SeaGlass Technology<\/title>\n<meta name=\"description\" content=\"New cyber threats are always emerging. Utilize network security assessment methodologies to uncover any unknown threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is A Network Security Assessment? - SeaGlass Technology\" \/>\n<meta property=\"og:description\" content=\"New cyber threats are always emerging. Utilize network security assessment methodologies to uncover any unknown threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"SeaGlass Technology\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-10T13:30:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-13T17:20:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/08\/to-run-analysis-of-the-defense-of-an-IT-infrastructure-is-network-security-assessment-scaled-e1596677147788.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SeaGlass Technology\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SeaGlass Technology\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-a-network-security-assessment\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-a-network-security-assessment\\\/\"},\"author\":{\"name\":\"SeaGlass Technology\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\"},\"headline\":\"What Is A Network Security Assessment?\",\"datePublished\":\"2020-08-10T13:30:17+00:00\",\"dateModified\":\"2021-01-13T17:20:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-a-network-security-assessment\\\/\"},\"wordCount\":802,\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-a-network-security-assessment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/to-run-analysis-of-the-defense-of-an-IT-infrastructure-is-network-security-assessment-scaled-e1596677147788.jpg\",\"articleSection\":[\"Network Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-a-network-security-assessment\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-a-network-security-assessment\\\/\",\"name\":\"What Is A Network Security Assessment? - SeaGlass Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-a-network-security-assessment\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-a-network-security-assessment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/to-run-analysis-of-the-defense-of-an-IT-infrastructure-is-network-security-assessment-scaled-e1596677147788.jpg\",\"datePublished\":\"2020-08-10T13:30:17+00:00\",\"dateModified\":\"2021-01-13T17:20:53+00:00\",\"description\":\"New cyber threats are always emerging. Utilize network security assessment methodologies to uncover any unknown threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-a-network-security-assessment\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-a-network-security-assessment\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-a-network-security-assessment\\\/#primaryimage\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/to-run-analysis-of-the-defense-of-an-IT-infrastructure-is-network-security-assessment-scaled-e1596677147788.jpg\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/to-run-analysis-of-the-defense-of-an-IT-infrastructure-is-network-security-assessment-scaled-e1596677147788.jpg\",\"width\":1600,\"height\":800,\"caption\":\"to run analysis of the defense of an IT infrastructure is network security assessment\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-a-network-security-assessment\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/seaglasstechnology.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is A Network Security Assessment?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"name\":\"SeaGlass Technology\",\"description\":\"Expert NYC IT Services You Can Trust\",\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/seaglasstechnology.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"width\":1000,\"height\":309,\"caption\":\"SeaGlass Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/author\\\/seaglass-technology\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is A Network Security Assessment? - SeaGlass Technology","description":"New cyber threats are always emerging. Utilize network security assessment methodologies to uncover any unknown threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/","og_locale":"en_US","og_type":"article","og_title":"What Is A Network Security Assessment? - SeaGlass Technology","og_description":"New cyber threats are always emerging. Utilize network security assessment methodologies to uncover any unknown threats.","og_url":"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/","og_site_name":"SeaGlass Technology","article_published_time":"2020-08-10T13:30:17+00:00","article_modified_time":"2021-01-13T17:20:53+00:00","og_image":[{"width":1600,"height":800,"url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/08\/to-run-analysis-of-the-defense-of-an-IT-infrastructure-is-network-security-assessment-scaled-e1596677147788.jpg","type":"image\/jpeg"}],"author":"SeaGlass Technology","twitter_card":"summary_large_image","twitter_misc":{"Written by":"SeaGlass Technology","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/#article","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/"},"author":{"name":"SeaGlass Technology","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585"},"headline":"What Is A Network Security Assessment?","datePublished":"2020-08-10T13:30:17+00:00","dateModified":"2021-01-13T17:20:53+00:00","mainEntityOfPage":{"@id":"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/"},"wordCount":802,"publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"image":{"@id":"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/08\/to-run-analysis-of-the-defense-of-an-IT-infrastructure-is-network-security-assessment-scaled-e1596677147788.jpg","articleSection":["Network Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/","url":"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/","name":"What Is A Network Security Assessment? - SeaGlass Technology","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/#primaryimage"},"image":{"@id":"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/08\/to-run-analysis-of-the-defense-of-an-IT-infrastructure-is-network-security-assessment-scaled-e1596677147788.jpg","datePublished":"2020-08-10T13:30:17+00:00","dateModified":"2021-01-13T17:20:53+00:00","description":"New cyber threats are always emerging. Utilize network security assessment methodologies to uncover any unknown threats.","breadcrumb":{"@id":"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/#primaryimage","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/08\/to-run-analysis-of-the-defense-of-an-IT-infrastructure-is-network-security-assessment-scaled-e1596677147788.jpg","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/08\/to-run-analysis-of-the-defense-of-an-IT-infrastructure-is-network-security-assessment-scaled-e1596677147788.jpg","width":1600,"height":800,"caption":"to run analysis of the defense of an IT infrastructure is network security assessment"},{"@type":"BreadcrumbList","@id":"https:\/\/seaglasstechnology.com\/what-is-a-network-security-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/seaglasstechnology.com\/"},{"@type":"ListItem","position":2,"name":"What Is A Network Security Assessment?"}]},{"@type":"WebSite","@id":"https:\/\/seaglasstechnology.com\/#website","url":"https:\/\/seaglasstechnology.com\/","name":"SeaGlass Technology","description":"Expert NYC IT Services You Can Trust","publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/seaglasstechnology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/seaglasstechnology.com\/#organization","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","width":1000,"height":309,"caption":"SeaGlass Technology"},"image":{"@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"}]}},"featured_image_src":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/08\/to-run-analysis-of-the-defense-of-an-IT-infrastructure-is-network-security-assessment-scaled-e1596677147788.jpg","featured_image_src_square":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2020\/08\/to-run-analysis-of-the-defense-of-an-IT-infrastructure-is-network-security-assessment-scaled-e1596677147788.jpg","author_info":{"display_name":"SeaGlass Technology","author_link":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"},"_links":{"self":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/2095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/comments?post=2095"}],"version-history":[{"count":0,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/2095\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media\/2096"}],"wp:attachment":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media?parent=2095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/categories?post=2095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/tags?post=2095"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/content_types?post=2095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}